0% found this document useful (0 votes)
200 views

Summative 2

This document appears to be a summative assessment for a class on empowerment technologies. It contains a matching question to align types of malware, internet terms, and security issues with their definitions. The assessment also asks open-ended questions about copyright law, dealing with online embarrassment, enumerating internet threats, tips for online research, and avoiding copyright infringement.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
200 views

Summative 2

This document appears to be a summative assessment for a class on empowerment technologies. It contains a matching question to align types of malware, internet terms, and security issues with their definitions. The assessment also asks open-ended questions about copyright law, dealing with online embarrassment, enumerating internet threats, tips for online research, and avoiding copyright infringement.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

EMPOWERMENT TECHNOLOGIES

Second Semester – Summative #2


Academic Year 2019 - 2020

NAME: ____________________________ SCORE:


GRADE/ YR.: ______________________

MATCHING TYPE: Match Column A with Column B. Write the letter of the correct answer on the
space
before each number.

A B
___________ 1. Virus a. Designed to send you advertisements
___________ 2. Rogue b. Sends an official – looking email and is
designed to steal sensitive personal
information
___________ 3. Keylogger c. A provision that allows you to use
copyrighted work without consent with
certain limitations
___________ 4. Adware d. A browser feature that is synonymous
to “private” browsing
___________ 5. Spam e. Replicates and can transfer from one
computer to another
___________ 6. Phishing f. Exploits the DNA system
___________ 7. Fair use g. States that anyone who uses your work
without your consent is punishable by
law
___________ 8. Spyware h. Runs in the background and monitors
what you are doing
___________ 9. Private i. Unwanted email mostly from bots
___________ 10. Malware j. Disguised as a useful program but is not
___________ 11. Incognito k. The information superhighway
___________ 12. Internet l. Tricks the user into posing that it is a
security software
___________ 13. Trojan m. A malicious software
___________ 14. Copyright n. An option to hide a post so that search
engines could not scan it
___________ 15. Pharming o. Used to record the keystrokes done by
the user

Answer the following: (5 points each)

1. Do you agree with the provisions of the copyright law? Defend your answer.
2. How would you feel if someone posted something embarrassing about you? What would
you do?

3. Enumerate the 3 internet threats and explain each.

4. Give tips in conducting online research.

5. How to avoid copyright infringement?

You might also like